Search results for "Intrusion"
showing 10 items of 159 documents
Laboratory tests addressed to realize customized restoration procedures of underwater archaeological ceramic finds
2013
The present contribution is part of a biennial research project funded by the Italian Ministry of Education, Universities and Research (MIUR). This study, currently in progress, deals with innovative experimental approaches applied to the chemical, mineralogical and physical transformations occurring during the prolonged permanence of archaeological ceramic finds in seawater environments as well as to restoration and conservation issues of the same underwater artifacts. The experimental approach used in this research consisted in the manufacture of ceramic test-pieces (briquettes) and their successive placing in underwater environment. This work aims at assessing how textural and compositio…
Validity of NMR pore-size analysis of cultutal heritage ancient building materials containing magnetic impurities
2007
NMR relaxation time distributions, obtained with laboratory and portable devices, are utilized to characterize the pore-size distributions of building materials coming from the Roman remains of the Greek-Roman Theatre of Taormina. To validate the interpretation of relaxation data in terms of pore-size distribution, comparison of results from standard and in situ NMR experiments with results of the mercury intrusion porosimetry (MIP) has been made. Although the pore-size distributions can be obtained by NMR in terms of either longitudinal (T-1) or transverse (T-2) relaxation times distributions, the shorter duration of the T-2 measurement makes it, in principle, preferable, although the dete…
Comparison between mercury intrusion porosimetry and nuclear magnetic resonance relaxometry to study the pore size distribution of limestones treated…
2019
Abstract Pore-space properties, such as pore-size distribution and connected porosity, are relevant factors in the evaluation of the performance of a consolidation treatment. In this study, two different techniques – Mercury Intrusion Porosimetry (MIP) and Nuclear Magnetic Resonance Relaxometry (NMRR) – were adopted to study the compatibility and the efficacy of a new consolidation product for limestones. This work aims at comparing and combining data obtained by MIP and NMRR; to confirm the relationship between the quantitative results of MIP and the qualitative ones of NMRR, a calibration which leads to correlate T2 distribution and pore size distribution has been applied. Experimental re…
2016
Objective: The Emotional Cascade Model (ECM) by Selby et al. (2008) proposes that people often engage in dysregulated behaviors to end extreme, aversive emotional states triggered by a self-perpetuating vicious cycle of (excessive) rumination, negative affect and attempts to suppress negative thoughts. Method: Besides replicating the ECM, we introduced intrusions as a mediator between rumination and behavioral dysregulation and tested this extended ECM for compulsions as part of obsessive-compulsive disorders. A structural equation modeling approach was used to test this in a sample of N = 414, randomly recruited from the general population. Results: Intrusions were found to fully mediate t…
Do Saharan Dust Days Carry a Risk of Hospitalization From Respiratory Diseases for Citizens of the Canary Islands (Spain)?
2021
Background: Saharan dust meets the Canary Islands at the beginning of its westward path across the North Atlantic, exceeding the European daily levels for PM10; for this reason, their two provincial capital cities, constitute optimal sites where to evaluate the health effects of this natural event. Objectives: To assess the short-term association between Saharan Dust Days (SDDs) and respiratory morbidity in the two capital cities. Methods: We carried out a time-series analysis with daily emergency hospital admissions due to all respiratory system diseases, chronic obstructive pulmonary disease (COPD) and asthma between 2001 and 2005, assessing the independent effect of SDDs, defined accordi…
An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs
2017
Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…
Monochromatic Long-Period Seismicity Prior to the 2012 Earthquake Swarm at Little Sitkin Volcano, Alaska
2021
Detection of the earliest stages of unrest is one of the most challenging and yet critically needed aspects of volcano monitoring. We investigate a sequence of five unusual long-period (LP) earthquakes that occurred in the days prior to the onset of a months-long volcano-tectonic (VT) earthquake swarm beneath Little Sitkin volcano in the Aleutian Islands during late 2012. The long-period earthquakes had two distinctive characteristics: their signals were dominated by a monochromatic spectral peak at approximately 0.57 Hz and they had impulsive P and S-wave arrivals on a seismometer located on Amchitka Island 80 km to the southeast of the volcano. In each case, the monochromatic earthquakes …
Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks
2013
In modern networks, HTTP clients communicate with web servers using request messages. By manipulating these messages attackers can collect confidential information from servers or even corrupt them. In this study, the approach based on anomaly detection is considered to find such attacks. For HTTP queries, feature matrices are obtained by applying an n-gram model, and, by learning on the basis of these matrices, growing hierarchical self-organizing maps are constructed. For HTTP headers, we employ statistical distribution models based on the lengths of header values and relative frequency of symbols. New requests received by the web-server are classified by using the maps and models obtaine…
PRIvacy LEakage Methodology (PRILE) for IDS Rules
2010
This paper introduces a methodology for evaluating PRIvacy LEakage in signature-based Network Intrusion Detection System (IDS) rules. IDS rules that expose more data than a given percentage of all data sessions are defined as privacy leaking. Furthermore, it analyses the IDS rule attack specific pattern size required in order to keep the privacy leakage below a given threshold, presuming that occurrence frequencies of the attack pattern in normal text are known. We have applied the methodology on the network intrusion detection system Snort’s rule set. The evaluation confirms that Snort in its default configuration aims at not being excessively privacy invasive. However we have identified s…
Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques
2013
Nowadays HTTP servers and applications are some of the most popular targets for network attacks. In this research, we consider an algorithm for HTTP intrusions detection based on simple clustering algorithms and advanced processing of HTTP requests which allows the analysis of all queries at once and does not separate them by resource. The method proposed allows detection of HTTP intrusions in case of continuously updated web-applications and does not require a set of HTTP requests free of attacks to build the normal user behaviour model. The algorithm is tested using logs acquired from a large real-life web service and, as a result, all attacks from these logs are detected, while the numbe…